{"affected":[{"ecosystem_specific":{"binaries":[{"curl":"7.66.0-4.3.1","libcurl-devel":"7.66.0-4.3.1","libcurl4":"7.66.0-4.3.1","libcurl4-32bit":"7.66.0-4.3.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Basesystem 15 SP2","name":"curl","purl":"pkg:rpm/suse/curl&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"7.66.0-4.3.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for curl fixes the following issues:\n\n- CVE-2020-8177: Fixed an issue where curl could have been tricked by a malicious \n  server to overwrite a local file when using the -J option (bsc#1173027).\t  \n- CVE-2020-8169: Fixed an issue where could have led to partial password leak   \n  over DNS on HTTP redirect (bsc#1173026).\n","id":"SUSE-SU-2020:1733-1","modified":"2020-06-24T07:43:40Z","published":"2020-06-24T07:43:40Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2020/suse-su-20201733-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1173026"},{"type":"REPORT","url":"https://bugzilla.suse.com/1173027"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-8169"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-8177"}],"related":["CVE-2020-8169","CVE-2020-8177"],"summary":"Security update for curl","upstream":["CVE-2020-8169","CVE-2020-8177"]}